发明名称 Techniques to control access to logic
摘要 Techniques are described herein that can be used to control which packets or other data are able to be processed or otherwise utilize logic of a computing device. For example, a signature may be associated with a packet or other data received from a network. The signature and the packet or other data may be transferred to the computing device. Prior to the computing device deciding whether to allow logic such as hardware or software to use, process, or act using the packet or other data, the computing device may inspect the signature to determine if such signature permits such packet or other data to be used, processed, or acted upon.
申请公布号 US7525967(B2) 申请公布日期 2009.04.28
申请号 US20050170294 申请日期 2005.06.28
申请人 INTEL CORPORATION 发明人 VASUDEVAN ANIL;SEN SUJOY;DIAMANT NIMROD
分类号 H04J3/26;G06F13/28;G06F15/173;H01L29/40;H04L12/56;H04L29/06 主分类号 H04J3/26
代理机构 代理人
主权项
地址